TEM Journal-Technology Education Management Informatics最新文献

筛选
英文 中文
Identifying and Analyzing Reduplication Multiword Expressions in Hindi Text Using Machine Learning 用机器学习识别和分析印地语文本中的重复多词表达式
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-56
A. Mishra, Alok Mishra
{"title":"Identifying and Analyzing Reduplication Multiword Expressions in Hindi Text Using Machine Learning","authors":"A. Mishra, Alok Mishra","doi":"10.18421/tem123-56","DOIUrl":"https://doi.org/10.18421/tem123-56","url":null,"abstract":"The task of identifying and analyzing Reduplication Multiword Expressions (RMWEs) in Natural Language Processing (NLP) involves extracting repeated words from various text forms and classifying them into Onomatopoeic, non-Onomatopoeic, partial, or semantic types. With the increasing use of low-resource languages in news, opinions, comments, hashtags, reviews, posts, and journals, this study proposes a machine learning-based RMWE identification method for Hindi text. The method employs linguistic patterns and statistical data, along with a proposed threshold boundary detection in statistical filtering. The Jaccard distance of dissimilarity and Sorensen Dice Coefficient of Similarity are used for semantic relation analysis. The proposed approach was evaluated using the publicly available Hindi corpus from IITB, measuring performance between two consecutive thresholds with the lowest error and highest recall. This study proposes an effective method for Indian computational linguistics, with experimental results highlighting its viability and utility, and providing a blueprint for current procedures.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45119762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The E-Student Profile – Status, Challenges and Perspectives E-Student简介——现状、挑战和展望
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-71
M. Stefanova, T. Stefanov, Silviya Varbanova
{"title":"The E-Student Profile – Status, Challenges and Perspectives","authors":"M. Stefanova, T. Stefanov, Silviya Varbanova","doi":"10.18421/tem123-71","DOIUrl":"https://doi.org/10.18421/tem123-71","url":null,"abstract":"This paper presents a prototype of an electronic system for the needs of students. The objective is to develop and promote a prototype electronic student profile. The methodology for designing the proposed prototype includes a review and comparative analysis of existing electronic student profiles in universities from Europe, America and Asia, based on the usability and other leading features similar to the functionality of the proposed system. Advantages of university platforms regarding functionality, user interface, usability, speed of access are described. Some of the analysed systems have weaknesses and associated problems that have been avoided in the developed electronic system. A survey was also conducted among students who actively use electronic profiles for training and administrative services, and the results were integrated to add useful features to the developed system. The paper presents the main characteristics of the proposed prototype, such as speed and ease of use, and an intuitive design with easy access to the required resources. The prototype could be implemented for the needs of academic users in any educational institution.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43844119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logistics Reengineering of Service Processes Through the Implementation of Software and Hardware of the Telephone Exchange in the Company 通过公司电话交换机软硬件的实现实现服务流程的物流再造
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-16
A. Behúnová, L. Knapčíková, M. Behún
{"title":"Logistics Reengineering of Service Processes Through the Implementation of Software and Hardware of the Telephone Exchange in the Company","authors":"A. Behúnová, L. Knapčíková, M. Behún","doi":"10.18421/tem123-16","DOIUrl":"https://doi.org/10.18421/tem123-16","url":null,"abstract":"In-house logistics is primarily about coordinating activities; quality planning; management, implementation, control of external and internal material flow, and synchronization of information and processes. Each process is closely related to the operator, who ensures optimal conditions for its operation. Implementing software and hardware for the telephone exchange and supporting corporate information management significantly increased customer satisfaction with the solution to their specific requirements. The impact of information technology, monitoring, data collection and processing in the company aims to make these processes more intelligent, emphasising obtaining certain strategic information important for further decision-making. A powerful and reliable communication platform is used in various industries, which is presented in the submitted manuscript. The advantage of a suitably chosen communication platform is that it offers a range of functions like traditional telephones combined with intelligent solutions for uniform communication. By applying service processes through implementing a software and hardware telephone exchange in the company, we focus on adapting solutions for each customer according to requirements. In the future, the research will focus on the digitization of the company and the use of smart technologies in the prediction of service processes in the company.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46563046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study on Human MovementClassification Using Wi-Fi Based PassiveForward Scattering Radar 基于Wi-Fi的被动前向散射雷达人体运动分类的比较研究
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-13
Muhammad Nazrin Farhan Nasarudin, Hidayatusherlina Razali, N. Ismail, Nor Ayu Zalina Zakaria, A. Alnaeb, Megat Syahirul Amin Megat Ali, N. E. Abdul Rashid
{"title":"A Comparative Study on Human Movement\u0000Classification Using Wi-Fi Based Passive\u0000Forward Scattering Radar","authors":"Muhammad Nazrin Farhan Nasarudin, Hidayatusherlina Razali, N. Ismail, Nor Ayu Zalina Zakaria, A. Alnaeb, Megat Syahirul Amin Megat Ali, N. E. Abdul Rashid","doi":"10.18421/tem123-13","DOIUrl":"https://doi.org/10.18421/tem123-13","url":null,"abstract":"Forward scattering radar has been widely used to classify human movements. To reduce concern of prolonged radiation exposure, Wi-Fi based passive scattering radar with bistatic topology is proposed. The movements include walking, bending, sitting, and kneeling. The enveloping algorithm applied to Wi-Fi based passive forward scattering radar signals has produced a comparable pattern to the ones from the active configuration. The features extracted from the frequency spectrum are also similar for both radar topologies. These led to comparable performance when classifying using artificial neural network. Hence, Wi-Fi can effectively reduce the cost of radar sensors.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43153574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Destructive Determination of Plant Pigments Based on Mobile Phone Data 基于手机数据的植物色素无损检测
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-23
M. Vasilev, V. Stoykova, P. Veleva, Z. Zlatev
{"title":"Non-Destructive Determination of Plant Pigments Based on Mobile Phone Data","authors":"M. Vasilev, V. Stoykova, P. Veleva, Z. Zlatev","doi":"10.18421/tem123-23","DOIUrl":"https://doi.org/10.18421/tem123-23","url":null,"abstract":"This paper proposes methods and tools for determining plant pigments using data from a mobile phone video sensor. A disadvantage of the known studies in this field is that they are mainly aimed at determining the chlorophyll content. There are few studies related to the determination of pigments such as carotenoids, flavonoids, and betalains, which are also important in terms of determining the condition of plants in their cultivation. Cucumbers were chosen because the long periods of drought in Bulgaria, lead to losses in cultivating these plants. Vectors containing colour and spectral indices were used. These features are obtained through a video sensor on a mobile phone. The kernel method variant of principal components reduces them. Feature vectors are selected using factor analysis, correspondence analysis, and the correlation method. Predictive models have been developed to determine plant pigments. With high accuracy (over 90%), the pigments xanthophyll and chlorophyll A can be predicted.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43299248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing Virtual Laboratory to Improve CNC Distance Learning of Vocational Students at Higher Education 利用虚拟实验室改进高职生数控远程教学
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-31
Febri Prasetya, Budi Syahri, Bayu Rahmadani Fajri, R. Wulansari, Aprilla Fortuna
{"title":"Utilizing Virtual Laboratory to Improve CNC Distance Learning of Vocational Students at Higher Education","authors":"Febri Prasetya, Budi Syahri, Bayu Rahmadani Fajri, R. Wulansari, Aprilla Fortuna","doi":"10.18421/tem123-31","DOIUrl":"https://doi.org/10.18421/tem123-31","url":null,"abstract":"This research develops learning materials for Computer Numerical Control (CNC) programming courses based on virtual reality technology. The impact of the Covid-19 pandemic on social activities, one of which is the educational aspect, has changed the learning pattern to a massive one where the learning process that should be carried out face-to-face, but now must carry out distance learning. Therefore, alternative learning media is needed to support the practicum process from a distance by utilizing virtual reality technology that is simulated using digital devices. The Software engineering models, namely: requirements, design, implementation, verification, and maintenance phases are the five primary stages used in this study, which uses the waterfall development model research method. The feasible of the virtual laboratory obtained the results of material validation, learning media, and small group trials of 12 diploma students of Mechanical Engineering at Universitas Negeri Padang. The findings of the study found that small group trials in CNC virtual laboratory can be successfully utilized in CNC programming courses. This research is expected to have implications for improving learning outcomes in CNC programming courses by using virtual laboratory technology in creating a conducive and quality learning atmosphere, so that the learning material provided can be accepted by students.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47451135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for the Propagation of Malicious Objects in a Computer Network with Variable Infection Intensity 具有可变感染强度的计算机网络中恶意对象的传播模型
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-06
Antoaneta Popova
{"title":"Model for the Propagation of Malicious Objects in a Computer Network with Variable Infection Intensity","authors":"Antoaneta Popova","doi":"10.18421/tem123-06","DOIUrl":"https://doi.org/10.18421/tem123-06","url":null,"abstract":"There are a significant number of scientific publications that use epidemic models to propagate malicious objects in a computer network. These models are based on Markovian models with a constant intensity of transitions, which does not correspond to real conditions, since the intensity of transitions changes due to the fact that after some time antivirus systems start to recognize malware. This paper proposes an original approach based on an epidemic model with variable infection intensity of hosts in a computer network. In the beginning, when the threat is not recognized, the malware spreads rapidly. After a certain period of time, the antivirus system recognizes the malicious code, which leads to a decrease in the infection intensity. Simulations have been done for different infection intensity and threat recognition. Demonstrated models account for the infection time of hosts in the computer network, latency phase, malware detection, and clearance from the system.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46389926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrinsic Motivations of Airbnb Hosts from the Perspective of Millennial Guests in Lima – Peru 从秘鲁利马千禧一代房客的视角看Airbnb房东的内在动机
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-59
Yajaira Paulina Navarro-Mendoza, R. M. Esparza-Huamanchumo, R. Hernández-Rojas
{"title":"Intrinsic Motivations of Airbnb Hosts from the Perspective of Millennial Guests in Lima – Peru","authors":"Yajaira Paulina Navarro-Mendoza, R. M. Esparza-Huamanchumo, R. Hernández-Rojas","doi":"10.18421/tem123-59","DOIUrl":"https://doi.org/10.18421/tem123-59","url":null,"abstract":"This study aims to analyze the host’s intrinsic motivations of the sharing accommodation Airbnb in the Miraflores district – Lima, from the perspective of millennial guests. Lima, capital of Peru, was selected since the economy of the city is based on a large part of visitors and tourists who enjoy its cultural, natural, gastronomic attractions and modern life. For this research, a qualitative approach was used, through content analysis, such as 258 reviews left by guests of the millennial segment who spent at least one night in the sharing accommodations of Miraflores district Airbnb’s hosts were analyzed. The collected information were processed by the Atlas.ti software where three main intrinsic motivations were identified: Altruism, Social Interaction and Cultural Capital. It is worth mentioning that disseminating and communicating messages related to the intrinsic motivations of the host is key for sharing accommodations, such as Airbnb. It allows us to understand how to attract new hosts, potential sharing accommodation entrepreneurs.Also, it promotes that current guests become hosts, and thus maintain the economic stability and growth of this business model.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46477895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Photovoltaic Energy Harvesting with Static and Dynamic Solar Modules Employing IoT-Enabled Performance Monitoring 采用物联网性能监测的静态和动态太阳能组件的光伏能量收集
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-15
K. Krismadinata, A. Asnil, Irma Husnaini, Remon Lapisa, Ricky Maulana, Muldi Yuhendri, Erita Astrid, P. Logamani
{"title":"Photovoltaic Energy Harvesting with Static and Dynamic Solar Modules Employing IoT-Enabled Performance Monitoring","authors":"K. Krismadinata, A. Asnil, Irma Husnaini, Remon Lapisa, Ricky Maulana, Muldi Yuhendri, Erita Astrid, P. Logamani","doi":"10.18421/tem123-15","DOIUrl":"https://doi.org/10.18421/tem123-15","url":null,"abstract":"This study examines the effectiveness of static and dynamic PV module models for solar energy gathering. The static design of the first solar panel is used, while the dynamic design of the second solar panel with a single-axis tracker is used. Finding the best model for capturing solar energy and turning it into electrical energy is the aim. Monitoring systems use IoT technologies. To detect variables including current, voltage, radiation, temperature, and humidity, the system has a number of sensors. The Thinger i.o program, coupled to the Arduino Uno used to control these sensors uses the Internet of Things (IoT) concept to evaluate and keep track of the outcomes of parameter measurements. As a result, the acquired measurement results can be viewed on the Thinger i.o application and checked remotely from any location. The three tests show that systems using dynamic ideas are better able to capture solar energy than static systems. The performance discrepancy is at its widest in the third test, when the dynamic system generates 14.4% more electrical energy than the static system.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43422234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Socio-Technical Perspective in Determining the Factors and Components for Minimizing Cybersecurity Threat 从社会技术角度确定最小化网络安全威胁的因素和组成部分
IF 0.7
TEM Journal-Technology Education Management Informatics Pub Date : 2023-08-28 DOI: 10.18421/tem123-66
Eko Haryadi, Abdul Karim, L. Salahuddin
{"title":"Socio-Technical Perspective in Determining the Factors and Components for Minimizing Cybersecurity Threat","authors":"Eko Haryadi, Abdul Karim, L. Salahuddin","doi":"10.18421/tem123-66","DOIUrl":"https://doi.org/10.18421/tem123-66","url":null,"abstract":"Smart city development necessitates careful planning and control. Many factors contribute to failures in smart cities, such as the lack of attention in dealing with cyber security threats, misappropriation of internet facilities, and limitedness of awareness and knowledge of basic-level cybersecurity to safely perform daily activities. Numerous studies have discovered that procrastinating, impulsive, forward-thinking, and risk-taking behaviours vary across organizations, which may help to explain why different organizations adhere to security policies. This research aims to analyse the socio-technical structural relationship of socio-technical perspective in determining the factors and components for minimizing security threat. The research uses a mixed-methods study while the results regarding the contribution of socio-technical components to the improvement of work behaviour in minimizing cybersecurity threats and proposes new analysis result of the contribution work behaviours as contribution and a positive influence for minimizing cybersecurity threat toward successful smart city.","PeriodicalId":45439,"journal":{"name":"TEM Journal-Technology Education Management Informatics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44522712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信